Hackers and Threats to your Mobile Enterprise News
May 29, 2015
As the global smartphone market slows, it's becoming readily apparent that the rise of smartphone security threats isn't slowing -- and no OS is safe.
May 22, 2008
Mobile malware has not been the great threat that many independent security experts have predicted, but they still predict the threat will come.
August 01, 2007
Mobile viruses are evolving beyond being considered a nuisance into a true threat to security, privacy and compliance.
June 12, 2006
Three stolen laptops jeopardize the personal information of former supermarket employees, customers of Hotels.com and members of the YMCA.
Hackers and Threats to your Mobile Enterprise Get Started
Bring yourself up to speed with our introductory content
Frequency jamming is the disruption of radio signals through use of an over-powered signal in the same frequency range. When most people think of frequency jamming, what comes to mind are radio, radar and cell phone jamming. However, any ... Continue Reading
War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. Continue Reading
Warchalking is a grass roots effort to create a standard iconography for public Wi-Fi access. Continue Reading
Evaluate Hackers and Threats to your Mobile Enterprise Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Smartphones with gyroscopes can be exploited to serve as an eavesdropping tool. Expert Nick Lewis explains how to mitigate smartphone gyroscope risk. Continue Reading
Manage Hackers and Threats to your Mobile Enterprise
Learn to apply best practices and optimize your operations.
Our VPN security and remote access expert explains how to protect against application store threats in this Ask the Expert response. Continue Reading
Problem Solve Hackers and Threats to your Mobile Enterprise Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading
Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile ... Continue Reading
The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware pros are getting serious about mobile malware. Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, ... Continue Reading